Security for e-Learning

In this chapter we provide an overview of background and current developments in e-Learning, including online collaborative learning, peer-to-peer learning, mobile collaborative systems, and applications that have security as a key requirement. We point out various drawbacks and limitations in the security of current e-Learning platforms and applications that potentially affect the underlying learning and networking processes.

[1]  Lorenzo Garc'ia Aretio,et al.  Las TIC en el sistema universitario español , 2005 .

[2]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[3]  Nikleia Eteokleous,et al.  We need an educationally relevant definition of mobile learning , 2005 .

[4]  Susan J. Lincke,et al.  Designing System Security with UML Misuse Deployment Diagrams , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.

[5]  Adam Všetíček MOOC (Massive Open Online Course) , 2014 .

[6]  Fatos Xhafa,et al.  Using mobile devices to support online collaborative learning , 2010 .

[7]  Susan K. Ferencz,et al.  Privacy Issues in a Virtual Learning Environment. , 1998 .

[8]  Nitesh V. Chawla,et al.  Authentication anomaly detection: a case study on a virtual private network , 2007, MineNet '07.

[9]  Manesh Sadasivan,et al.  Multi-layered collaborative approach to address enterprise mobile security challenges , 2010, 2010 IEEE 2nd Workshop on Collaborative Security Technologies.

[10]  J.C.G. Hernandez,et al.  Moodle security vulnerabilities , 2008, 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control.

[11]  Kamlesh Dutta,et al.  INVESTIGATION ON SECURITY IN LMS MOODLE , 2011 .

[12]  Timothy Koschmann,et al.  Paradigm Shift s and Instructional Technology , 1996 .

[13]  Shon Harris All-in-one CISSP certification exam guide , 2003 .

[14]  Yair Levy,et al.  A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .

[15]  Mike Sharples,et al.  Towards a Theory of Mobile Learning , 2005 .

[16]  Gary Wills,et al.  An approach to presence verification in summative e-assessment security , 2010, 2010 International Conference on Information Society.

[17]  Kikelomo Maria Apampa Presence verification for summative e-assessments , 2010 .

[18]  Zongwei Luo,et al.  A Mobile Service Platform for Trustworthy E-Learning Service Provisioning , 2010, Int. J. Dependable Trust. Inf. Syst..

[19]  Boaz Gelbord,et al.  On the use of PKI technologies for secure and private e-learning environments , 2003, CompSysTech '03.

[20]  Wolfgang Hommel Security and Privacy Management for Learning Management Systems , 2010 .

[21]  Jonathan Haber The Future of MOOCs , 2014 .

[22]  Gilbert Moïsio,et al.  Internet Engineering Task Force , 2014 .

[23]  P. Laforcade Towards a UML-based educational modeling language , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[24]  Valentin Robu,et al.  Emergence of consensus and shared vocabularies in collaborative tagging systems , 2009, TWEB.

[25]  Christian J. Eibl Discussion of information security in e-learning , 2010 .

[26]  Jianming Yong Digital Identity Design and Privacy Preservation for e-Learning , 2007, 2007 11th International Conference on Computer Supported Cooperative Work in Design.

[27]  K. Schwab Global Risks 2014 , 2014 .

[28]  Manuel Mazzara,et al.  Social Networks and Collective Intelligence: A Return to the Agora , 2013, ArXiv.

[29]  Pei Jiao How to solve the security and privacy problems within e-learning , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.

[30]  Joerg Zumbach,et al.  Supporting Distributed Problem-Based Learning: The Use of Feedback Mechanisms in Outline Learning , 2004 .

[31]  Georgios Kambourakis,et al.  A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..

[32]  Jordi Herrera-Joancomartí,et al.  A secure e-exam management system , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[33]  George Siemens,et al.  The MOOC model for digital practice , 2010 .

[34]  Morten Flate Paulsen,et al.  Online Education Systems: Discussion and Definition of Terms , 2002 .

[35]  Gerry Stahl,et al.  Contributions to a theoretical framework for CSCL , 2002, CSCL.

[36]  Edgar R. Weippl Security in e-learning , 2005, ELERN.

[37]  Kapil Raina PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues , 2003 .

[38]  Jasmin Azemovic,et al.  Model of efficient Assessment System with accent on privacy, security and integration with E-University components , 2010, 2010 2nd International Conference on Education Technology and Computer.

[39]  Khalil El-Khatib,et al.  Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..

[40]  David Arroyo,et al.  An Approach for Adapting Moodle into a Secure Infrastructure , 2011, CISIS.

[41]  Luca Longo,et al.  Enhancing Social Search: A Computational Collective Intelligence Model of Behavioural Traits, Trust and Time , 2010, Trans. Comput. Collect. Intell..

[42]  Albert Sangrà A New Learning Model for the Information and Knowledge Society: The Case of the Universitat Oberta de Catalunya (UOC), Spain , 2002 .

[43]  Laurianne McLaughlin,et al.  Interview: Holistic Security , 2005, IEEE Secur. Priv..

[44]  Zheng Wu,et al.  A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.

[45]  Sigrid E. Schubert,et al.  Development of E-Learning Design Criteria with Secure Realization Concepts , 2008, ISSEP.

[46]  Donn B. Parker,et al.  Toward a New Framework for Information Security , 2015 .

[47]  Sébastien George,et al.  Privacy Concerns in E-learning: Is Using Tracking System a Threat? , 2011 .

[48]  P. Dillenbourg What do you mean by collaborative learning , 1999 .

[49]  Stewart Kowalski,et al.  Secure e-learning using a holistic and immune security framework , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[50]  K. Pisutova,et al.  Open education , 2012, 2012 IEEE 10th International Conference on Emerging eLearning Technologies and Applications (ICETA).